SECURITY Comparison on KOREAN Password / Authentication Policy and Other Countries

J-Institute ◽  
2018 ◽  
Vol 3 (2) ◽  
pp. 6-13
Author(s):  
Kyeong-joo Jung ◽  
◽  
Simon Woo ◽  
2019 ◽  
Vol 7 (6) ◽  
pp. 633-635
Author(s):  
Payal . ◽  
Suman Sangwan ◽  
Arun Malik

2010 ◽  
Vol 143-144 ◽  
pp. 915-919
Author(s):  
Yung Cheng Lee

The well-known password authentication mechanisms are widely used in networks to protect resources from unauthorized access. The ad hoc networks, due to their dynamic and lack of network infrastructure features, require authentication schemes to ensure security. In this paper, we propose a new threshold password authentication scheme for ad hoc networks. Our scheme can be efficiently implemented in mobile devices, and can achieve mutual authentication with registered users.


Sign in / Sign up

Export Citation Format

Share Document